General

  • Target

    2024-04-19_e6554e73818bc30cb85522e072f1e0ed_cryptolocker

  • Size

    49KB

  • MD5

    e6554e73818bc30cb85522e072f1e0ed

  • SHA1

    a79a90ddb8d78fcdf7e19ac4e1e647287ea2f2fc

  • SHA256

    caa9795a9f6d2a3e69a3af6c4c30bb9fabfe0204104c00ffca67a1142de94478

  • SHA512

    14a4a00d2860c4106a26e9f3d5b9f86ce720e51169c835ddf346ebe74bc288d355905d802a8c073141560af3fcc11b9135a0c34fd47e3741763c78f3d7cf9bbe

  • SSDEEP

    768:qmOKYQDf5XdrDmjr5tOOtEvwDpjAajFEitQbDmoSQCVUBJUkQqAHBIG05W2MocF:qmbhXDmjr5MOtEvwDpj5cDtKkQZQ4

Score
10/10

Malware Config

Signatures

  • Detection of CryptoLocker Variants 1 IoCs
  • UPX dump on OEP (original entry point) 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-04-19_e6554e73818bc30cb85522e072f1e0ed_cryptolocker
    .exe windows:5 windows x86 arch:x86


    Headers

    Sections